Created
January 28, 2023 22:28
-
-
Save jlopp/ff8a10111f6b53f211c3e43ce8018e4f to your computer and use it in GitHub Desktop.
OPNSense config file for whole-home WireGuard VPN per https://blog.lopp.net/how-to-protect-your-home-network-with-a-gigabit-vpn
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?xml version="1.0"?> | |
| <opnsense> | |
| <theme>opnsense</theme> | |
| <sysctl> | |
| <item> | |
| <descr>Increase UFS read-ahead speeds to match the state of hard drives and NCQ.</descr> | |
| <tunable>vfs.read_max</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Set the ephemeral port range to be lower.</descr> | |
| <tunable>net.inet.ip.portrange.first</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Drop packets to closed TCP ports without returning a RST</descr> | |
| <tunable>net.inet.tcp.blackhole</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Do not send ICMP port unreachable messages for closed UDP ports</descr> | |
| <tunable>net.inet.udp.blackhole</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Randomize the ID field in IP packets</descr> | |
| <tunable>net.inet.ip.random_id</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr> | |
| Source routing is another way for an attacker to try to reach non-routable addresses behind your box. | |
| It can also be used to probe for information about your internal networks. These functions come enabled | |
| as part of the standard FreeBSD core system. | |
| </descr> | |
| <tunable>net.inet.ip.sourceroute</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr> | |
| Source routing is another way for an attacker to try to reach non-routable addresses behind your box. | |
| It can also be used to probe for information about your internal networks. These functions come enabled | |
| as part of the standard FreeBSD core system. | |
| </descr> | |
| <tunable>net.inet.ip.accept_sourceroute</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr> | |
| This option turns off the logging of redirect packets because there is no limit and this could fill | |
| up your logs consuming your whole hard drive. | |
| </descr> | |
| <tunable>net.inet.icmp.log_redirect</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Drop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)</descr> | |
| <tunable>net.inet.tcp.drop_synfin</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Enable sending IPv6 redirects</descr> | |
| <tunable>net.inet6.ip6.redirect</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Enable privacy settings for IPv6 (RFC 4941)</descr> | |
| <tunable>net.inet6.ip6.use_tempaddr</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Prefer privacy addresses and use them over the normal addresses</descr> | |
| <tunable>net.inet6.ip6.prefer_tempaddr</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Generate SYN cookies for outbound SYN-ACK packets</descr> | |
| <tunable>net.inet.tcp.syncookies</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Maximum incoming/outgoing TCP datagram size (receive)</descr> | |
| <tunable>net.inet.tcp.recvspace</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Maximum incoming/outgoing TCP datagram size (send)</descr> | |
| <tunable>net.inet.tcp.sendspace</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Do not delay ACK to try and piggyback it onto a data packet</descr> | |
| <tunable>net.inet.tcp.delayed_ack</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Maximum outgoing UDP datagram size</descr> | |
| <tunable>net.inet.udp.maxdgram</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Handling of non-IP packets which are not passed to pfil (see if_bridge(4))</descr> | |
| <tunable>net.link.bridge.pfil_onlyip</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Set to 1 to additionally filter on the physical interface for locally destined packets</descr> | |
| <tunable>net.link.bridge.pfil_local_phys</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Set to 0 to disable filtering on the incoming and outgoing member interfaces.</descr> | |
| <tunable>net.link.bridge.pfil_member</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Set to 1 to enable filtering on the bridge interface</descr> | |
| <tunable>net.link.bridge.pfil_bridge</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Allow unprivileged access to tap(4) device nodes</descr> | |
| <tunable>net.link.tap.user_open</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Randomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())</descr> | |
| <tunable>kern.randompid</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Disable CTRL+ALT+Delete reboot from keyboard.</descr> | |
| <tunable>hw.syscons.kbd_reboot</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Enable TCP extended debugging</descr> | |
| <tunable>net.inet.tcp.log_debug</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Set ICMP Limits</descr> | |
| <tunable>net.inet.icmp.icmplim</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>TCP Offload Engine</descr> | |
| <tunable>net.inet.tcp.tso</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>UDP Checksums</descr> | |
| <tunable>net.inet.udp.checksum</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <tunable>kern.ipc.maxsockbuf</tunable> | |
| <value>614400000</value> | |
| <descr>Maximum socket buffer size</descr> | |
| </item> | |
| <item> | |
| <descr>Page Table Isolation (Meltdown mitigation, requires reboot.)</descr> | |
| <tunable>vm.pmap.pti</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <tunable>hw.ibrs_disable</tunable> | |
| <value>1</value> | |
| <descr>Disable Indirect Branch Restricted Speculation (Spectre V2 mitigation)</descr> | |
| </item> | |
| <item> | |
| <descr>Hide processes running as other groups</descr> | |
| <tunable>security.bsd.see_other_gids</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Hide processes running as other users</descr> | |
| <tunable>security.bsd.see_other_uids</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr>Enable/disable sending of ICMP redirects in response to IP packets for which a better, | |
| and for the sender directly reachable, route and next hop is known. | |
| </descr> | |
| <tunable>net.inet.ip.redirect</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <descr> | |
| Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects | |
| to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect | |
| packets without returning a response. | |
| </descr> | |
| <tunable>net.inet.icmp.drop_redirect</tunable> | |
| <value>1</value> | |
| </item> | |
| <item> | |
| <descr>Maximum outgoing UDP datagram size</descr> | |
| <tunable>net.local.dgram.maxdgram</tunable> | |
| <value>default</value> | |
| </item> | |
| <item> | |
| <tunable>net.isr.maxthreads</tunable> | |
| <value>-1</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.isr.bindthreads</tunable> | |
| <value>1</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.isr.dispatch</tunable> | |
| <value>deferred</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.inet.tcp.soreceive_stream</tunable> | |
| <value>1</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.pf.source_nodes_hashsize</tunable> | |
| <value>1048576</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.inet.tcp.mssdflt</tunable> | |
| <value>1240</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.inet.tcp.abc_l_var</tunable> | |
| <value>52</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.inet.tcp.minmss</tunable> | |
| <value>536</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>kern.random.fortuna.minpoolsize</tunable> | |
| <value>128</value> | |
| <descr/> | |
| </item> | |
| <item> | |
| <tunable>net.isr.defaultqlimit</tunable> | |
| <value>2048</value> | |
| <descr/> | |
| </item> | |
| </sysctl> | |
| <system> | |
| <optimization>normal</optimization> | |
| <hostname>OPNsense</hostname> | |
| <domain>localdomain</domain> | |
| <group> | |
| <name>admins</name> | |
| <description>System Administrators</description> | |
| <scope>system</scope> | |
| <gid>1999</gid> | |
| <member>0</member> | |
| <priv>page-all</priv> | |
| </group> | |
| <user> | |
| <name>root</name> | |
| <descr>System Administrator</descr> | |
| <scope>system</scope> | |
| <groupname>admins</groupname> | |
| <password>$2y$10$/KxEWx3gxj1BdoJiUzp4Iuz7MUg2.uE7RVuJUhWP.fmvF05/pmoGW</password> | |
| <uid>0</uid> | |
| <expires/> | |
| <authorizedkeys/> | |
| <otp_seed/> | |
| </user> | |
| <nextuid>2000</nextuid> | |
| <nextgid>2000</nextgid> | |
| <timezone>America/New_York</timezone> | |
| <timeservers>0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.org</timeservers> | |
| <webgui> | |
| <protocol>https</protocol> | |
| <ssl-certref>638682ed1f3b2</ssl-certref> | |
| </webgui> | |
| <disablenatreflection>yes</disablenatreflection> | |
| <usevirtualterminal>1</usevirtualterminal> | |
| <disableconsolemenu/> | |
| <disablevlanhwfilter>1</disablevlanhwfilter> | |
| <disablechecksumoffloading>1</disablechecksumoffloading> | |
| <disablesegmentationoffloading>1</disablesegmentationoffloading> | |
| <disablelargereceiveoffloading>1</disablelargereceiveoffloading> | |
| <ipv6allow/> | |
| <powerd_ac_mode>hadp</powerd_ac_mode> | |
| <powerd_battery_mode>hadp</powerd_battery_mode> | |
| <powerd_normal_mode>hadp</powerd_normal_mode> | |
| <bogons> | |
| <interval>monthly</interval> | |
| </bogons> | |
| <pf_share_forward>1</pf_share_forward> | |
| <lb_use_sticky>1</lb_use_sticky> | |
| <ssh> | |
| <group>admins</group> | |
| </ssh> | |
| <rrdbackup>-1</rrdbackup> | |
| <netflowbackup>-1</netflowbackup> | |
| <firmware version="1.0.0"> | |
| <mirror/> | |
| <flavour/> | |
| <plugins>os-wireguard</plugins> | |
| </firmware> | |
| <language>en_US</language> | |
| <dnsserver>9.9.9.9</dnsserver> | |
| <dnsserver>1.1.1.1</dnsserver> | |
| <dns1gw>WireGuard</dns1gw> | |
| <dns2gw>WireGuard</dns2gw> | |
| <dns3gw>none</dns3gw> | |
| <dns4gw>none</dns4gw> | |
| <dns5gw>none</dns5gw> | |
| <dns6gw>none</dns6gw> | |
| <dns7gw>none</dns7gw> | |
| <dns8gw>none</dns8gw> | |
| <prefer_ipv4>1</prefer_ipv4> | |
| </system> | |
| <interfaces> | |
| <wan> | |
| <enable>1</enable> | |
| <if>igb0</if> | |
| <ipaddr>dhcp</ipaddr> | |
| <ipaddrv6>dhcp6</ipaddrv6> | |
| <gateway/> | |
| <blockbogons>on</blockbogons> | |
| <media/> | |
| <mediaopt/> | |
| <dhcp6-ia-pd-len>0</dhcp6-ia-pd-len> | |
| </wan> | |
| <lan> | |
| <enable>1</enable> | |
| <if>igb1</if> | |
| <ipaddr>192.168.1.1</ipaddr> | |
| <subnet>24</subnet> | |
| <ipaddrv6>track6</ipaddrv6> | |
| <subnetv6>64</subnetv6> | |
| <media/> | |
| <mediaopt/> | |
| <track6-interface>wan</track6-interface> | |
| <track6-prefix-id>0</track6-prefix-id> | |
| </lan> | |
| <lo0> | |
| <internal_dynamic>1</internal_dynamic> | |
| <descr>Loopback</descr> | |
| <enable>1</enable> | |
| <if>lo0</if> | |
| <ipaddr>127.0.0.1</ipaddr> | |
| <ipaddrv6>::1</ipaddrv6> | |
| <subnet>8</subnet> | |
| <subnetv6>128</subnetv6> | |
| <type>none</type> | |
| <virtual>1</virtual> | |
| </lo0> | |
| <opt2> | |
| <if>igb3</if> | |
| <descr>OPT2</descr> | |
| </opt2> | |
| <opt3> | |
| <if>igb4</if> | |
| <descr>OPT3</descr> | |
| </opt3> | |
| <opt4> | |
| <if>igb5</if> | |
| <descr>OPT4</descr> | |
| </opt4> | |
| <opt1> | |
| <descr>OPT1</descr> | |
| <if>igb2</if> | |
| </opt1> | |
| <opt5> | |
| <if>wg1</if> | |
| <descr>Wireguard</descr> | |
| <enable>1</enable> | |
| <lock>1</lock> | |
| <spoofmac/> | |
| <mtu>1420</mtu> | |
| <mss>1420</mss> | |
| </opt5> | |
| <wireguard> | |
| <internal_dynamic>1</internal_dynamic> | |
| <enable>1</enable> | |
| <if>wireguard</if> | |
| <descr>WireGuard (Group)</descr> | |
| <type>group</type> | |
| <virtual>1</virtual> | |
| <networks/> | |
| </wireguard> | |
| </interfaces> | |
| <dhcpd> | |
| <lan> | |
| <enable>1</enable> | |
| <ddnsdomainalgorithm>hmac-md5</ddnsdomainalgorithm> | |
| <numberoptions> | |
| <item/> | |
| </numberoptions> | |
| <range> | |
| <from>192.168.1.10</from> | |
| <to>192.168.1.245</to> | |
| </range> | |
| <winsserver/> | |
| <dnsserver/> | |
| <ntpserver/> | |
| <staticmap> | |
| <mac>88:88:88:88:88:88</mac> | |
| <ipaddr>192.168.1.102</ipaddr> | |
| <hostname>LG-Smart-TV</hostname> | |
| <descr>Smart TV</descr> | |
| <winsserver/> | |
| <dnsserver/> | |
| <ntpserver/> | |
| </staticmap> | |
| </lan> | |
| </dhcpd> | |
| <unbound> | |
| <enable>1</enable> | |
| <outgoing_interface>opt5</outgoing_interface> | |
| </unbound> | |
| <snmpd> | |
| <syslocation/> | |
| <syscontact/> | |
| <rocommunity>public</rocommunity> | |
| </snmpd> | |
| <nat> | |
| <outbound> | |
| <mode>hybrid</mode> | |
| <rule> | |
| <source> | |
| <network>WireGuard_Routed_Devices</network> | |
| </source> | |
| <destination> | |
| <any>1</any> | |
| </destination> | |
| <descr>WireGuard NAT</descr> | |
| <category/> | |
| <interface>opt5</interface> | |
| <tag/> | |
| <tagged/> | |
| <poolopts/> | |
| <poolopts_sourcehashkey/> | |
| <ipprotocol>inet</ipprotocol> | |
| <created> | |
| <username>root@192.168.1.101</username> | |
| <time>1674476031.1913</time> | |
| <description>/firewall_nat_out_edit.php made changes</description> | |
| </created> | |
| <target/> | |
| <targetip_subnet>0</targetip_subnet> | |
| <sourceport/> | |
| <updated> | |
| <username>root@192.168.1.101</username> | |
| <time>1674512995.7868</time> | |
| <description>/firewall_nat_out_edit.php made changes</description> | |
| </updated> | |
| </rule> | |
| </outbound> | |
| <rule/> | |
| </nat> | |
| <filter> | |
| <rule uuid="5a383135-2b99-453d-8df5-53c9d2959275"> | |
| <type>pass</type> | |
| <ipprotocol>inet</ipprotocol> | |
| <statetype>keep state</statetype> | |
| <gateway>WireGuard</gateway> | |
| <direction>out</direction> | |
| <floating>yes</floating> | |
| <allowopts>1</allowopts> | |
| <quick>0</quick> | |
| <source> | |
| <network>opt5ip</network> | |
| </source> | |
| <destination> | |
| <network>opt5</network> | |
| <not>1</not> | |
| </destination> | |
| <updated> | |
| <username>root@192.168.1.101</username> | |
| <time>1674512903.7253</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </updated> | |
| <created> | |
| <username>root@192.168.1.101</username> | |
| <time>1674421928.6829</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </created> | |
| </rule> | |
| <rule uuid="cb40ddce-016d-43cd-b925-da4cd80e9e4b"> | |
| <type>block</type> | |
| <interface>wan</interface> | |
| <ipprotocol>inet</ipprotocol> | |
| <tagged>NO_WAN_EGRESS</tagged> | |
| <statetype>keep state</statetype> | |
| <descr>VPN Kill Switch (block traffic if tunnel goes down)</descr> | |
| <direction>out</direction> | |
| <floating>yes</floating> | |
| <quick>1</quick> | |
| <source> | |
| <any>1</any> | |
| </source> | |
| <destination> | |
| <any>1</any> | |
| </destination> | |
| <updated> | |
| <username>root@192.168.1.103</username> | |
| <time>1674933692.2985</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </updated> | |
| <created> | |
| <username>root@192.168.1.103</username> | |
| <time>1674933665.0812</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </created> | |
| </rule> | |
| <rule uuid="061d8a1f-f331-4e10-99c3-817d199c291b"> | |
| <type>pass</type> | |
| <interface>wan</interface> | |
| <ipprotocol>inet</ipprotocol> | |
| <statetype>keep state</statetype> | |
| <direction>in</direction> | |
| <quick>1</quick> | |
| <source> | |
| <any>1</any> | |
| </source> | |
| <destination> | |
| <any>1</any> | |
| </destination> | |
| <updated> | |
| <username>root@192.168.1.101</username> | |
| <time>1674475758.2962</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </updated> | |
| <created> | |
| <username>root@192.168.1.101</username> | |
| <time>1674475758.2962</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </created> | |
| <disabled>1</disabled> | |
| </rule> | |
| <rule uuid="e3afb473-580a-4f40-af88-a5bc8109e5ad"> | |
| <type>pass</type> | |
| <interface>lan</interface> | |
| <ipprotocol>inet</ipprotocol> | |
| <tag>NO_WAN_EGRESS</tag> | |
| <statetype>keep state</statetype> | |
| <descr>internal wireguard routing</descr> | |
| <gateway>WireGuard</gateway> | |
| <direction>in</direction> | |
| <quick>1</quick> | |
| <source> | |
| <address>WireGuard_Routed_Devices</address> | |
| </source> | |
| <destination> | |
| <address>RFC1918_Networks</address> | |
| <not>1</not> | |
| </destination> | |
| <updated> | |
| <username>root@192.168.1.101</username> | |
| <time>1674512791.4965</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </updated> | |
| <created> | |
| <username>root@192.168.1.101</username> | |
| <time>1674411649.7547</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </created> | |
| </rule> | |
| <rule uuid="93d57b38-26ec-461b-91a7-487ff1a0a704"> | |
| <type>pass</type> | |
| <ipprotocol>inet</ipprotocol> | |
| <descr>Default allow LAN to any rule</descr> | |
| <interface>lan</interface> | |
| <source> | |
| <network>lan</network> | |
| </source> | |
| <destination> | |
| <any/> | |
| </destination> | |
| </rule> | |
| <rule uuid="41f6794b-b632-42dd-8424-da8d073b2e8f"> | |
| <type>pass</type> | |
| <ipprotocol>inet6</ipprotocol> | |
| <descr>Default allow LAN IPv6 to any rule</descr> | |
| <interface>lan</interface> | |
| <source> | |
| <network>lan</network> | |
| </source> | |
| <destination> | |
| <any/> | |
| </destination> | |
| </rule> | |
| <rule uuid="d32191ff-5fc9-4c42-9a26-6f648535a3cc"> | |
| <type>pass</type> | |
| <interface>opt5</interface> | |
| <ipprotocol>inet</ipprotocol> | |
| <statetype>keep state</statetype> | |
| <descr>Allow All – WG</descr> | |
| <direction>in</direction> | |
| <quick>1</quick> | |
| <source> | |
| <any>1</any> | |
| </source> | |
| <destination> | |
| <any>1</any> | |
| </destination> | |
| <updated> | |
| <username>root@192.168.1.101</username> | |
| <time>1674177381.1914</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </updated> | |
| <created> | |
| <username>root@192.168.1.101</username> | |
| <time>1674177381.1914</time> | |
| <description>/firewall_rules_edit.php made changes</description> | |
| </created> | |
| </rule> | |
| </filter> | |
| <rrd> | |
| <enable/> | |
| </rrd> | |
| <load_balancer> | |
| <monitor_type> | |
| <name>ICMP</name> | |
| <type>icmp</type> | |
| <descr>ICMP</descr> | |
| <options/> | |
| </monitor_type> | |
| <monitor_type> | |
| <name>TCP</name> | |
| <type>tcp</type> | |
| <descr>Generic TCP</descr> | |
| <options/> | |
| </monitor_type> | |
| <monitor_type> | |
| <name>HTTP</name> | |
| <type>http</type> | |
| <descr>Generic HTTP</descr> | |
| <options> | |
| <path>/</path> | |
| <host/> | |
| <code>200</code> | |
| </options> | |
| </monitor_type> | |
| <monitor_type> | |
| <name>HTTPS</name> | |
| <type>https</type> | |
| <descr>Generic HTTPS</descr> | |
| <options> | |
| <path>/</path> | |
| <host/> | |
| <code>200</code> | |
| </options> | |
| </monitor_type> | |
| <monitor_type> | |
| <name>SMTP</name> | |
| <type>send</type> | |
| <descr>Generic SMTP</descr> | |
| <options> | |
| <send/> | |
| <expect>220 *</expect> | |
| </options> | |
| </monitor_type> | |
| </load_balancer> | |
| <ntpd> | |
| <prefer>0.opnsense.pool.ntp.org</prefer> | |
| </ntpd> | |
| <widgets> | |
| <sequence>system_information-container:00000000-col3:show,services_status-container:00000001-col4:show,gateways-container:00000002-col4:show,interface_list-container:00000003-col4:show</sequence> | |
| <column_count>2</column_count> | |
| </widgets> | |
| <revision> | |
| <username>root@192.168.1.103</username> | |
| <time>1674944123.1917</time> | |
| <description>user "root" changed</description> | |
| </revision> | |
| <OPNsense> | |
| <captiveportal version="1.0.1"> | |
| <zones/> | |
| <templates/> | |
| </captiveportal> | |
| <cron version="1.0.3"> | |
| <jobs/> | |
| </cron> | |
| <Firewall> | |
| <Lvtemplate version="0.0.1"> | |
| <templates/> | |
| </Lvtemplate> | |
| <Category version="1.0.0"> | |
| <categories/> | |
| </Category> | |
| <Alias version="1.0.1"> | |
| <geoip> | |
| <url/> | |
| </geoip> | |
| <aliases> | |
| <alias uuid="505156d7-6c0b-4ef8-9a12-9b2614b04385"> | |
| <enabled>1</enabled> | |
| <name>WireGuard_Routed_Devices</name> | |
| <type>network</type> | |
| <proto/> | |
| <interface/> | |
| <counters>0</counters> | |
| <updatefreq/> | |
| <content>192.168.1.103/32 | |
| 192.168.1.104/29 | |
| 192.168.1.112/28 | |
| 192.168.1.128/25</content> | |
| <categories/> | |
| <description/> | |
| </alias> | |
| <alias uuid="674b99c4-a2af-4e40-8e02-1d85ec675084"> | |
| <enabled>1</enabled> | |
| <name>RFC1918_Networks</name> | |
| <type>network</type> | |
| <proto/> | |
| <interface/> | |
| <counters>0</counters> | |
| <updatefreq/> | |
| <content>192.168.0.0/16 | |
| 10.0.0.0/8 | |
| 172.16.0.0/12</content> | |
| <categories/> | |
| <description/> | |
| </alias> | |
| </aliases> | |
| </Alias> | |
| </Firewall> | |
| <Netflow version="1.0.1"> | |
| <capture> | |
| <interfaces/> | |
| <egress_only/> | |
| <version>v9</version> | |
| <targets/> | |
| </capture> | |
| <collect> | |
| <enable>0</enable> | |
| </collect> | |
| <activeTimeout>1800</activeTimeout> | |
| <inactiveTimeout>15</inactiveTimeout> | |
| </Netflow> | |
| <IDS version="1.0.7"> | |
| <rules/> | |
| <policies/> | |
| <userDefinedRules/> | |
| <files/> | |
| <fileTags/> | |
| <general> | |
| <enabled>0</enabled> | |
| <ips>0</ips> | |
| <promisc>0</promisc> | |
| <interfaces>wan</interfaces> | |
| <homenet>192.168.0.0/16,10.0.0.0/8,172.16.0.0/12</homenet> | |
| <defaultPacketSize/> | |
| <UpdateCron/> | |
| <AlertLogrotate>W0D23</AlertLogrotate> | |
| <AlertSaveLogs>4</AlertSaveLogs> | |
| <MPMAlgo>ac</MPMAlgo> | |
| <detect> | |
| <Profile>medium</Profile> | |
| <toclient_groups/> | |
| <toserver_groups/> | |
| </detect> | |
| <syslog>0</syslog> | |
| <syslog_eve>0</syslog_eve> | |
| <LogPayload>0</LogPayload> | |
| </general> | |
| </IDS> | |
| <IPsec version="1.0.1"> | |
| <general> | |
| <enabled/> | |
| </general> | |
| <keyPairs/> | |
| <preSharedKeys/> | |
| </IPsec> | |
| <Interfaces> | |
| <vxlans version="1.0.1"/> | |
| <loopbacks version="1.0.0"/> | |
| </Interfaces> | |
| <monit version="1.0.11"> | |
| <general> | |
| <enabled>0</enabled> | |
| <interval>120</interval> | |
| <startdelay>120</startdelay> | |
| <mailserver>127.0.0.1</mailserver> | |
| <port>25</port> | |
| <username/> | |
| <password/> | |
| <ssl>0</ssl> | |
| <sslversion>auto</sslversion> | |
| <sslverify>1</sslverify> | |
| <logfile>syslog facility log_daemon</logfile> | |
| <statefile/> | |
| <eventqueuePath/> | |
| <eventqueueSlots/> | |
| <httpdEnabled>0</httpdEnabled> | |
| <httpdUsername>root</httpdUsername> | |
| <httpdPassword>KhZpyvGvVqBrjJCqnFu</httpdPassword> | |
| <httpdPort>2812</httpdPort> | |
| <httpdAllow/> | |
| <mmonitUrl/> | |
| <mmonitTimeout>5</mmonitTimeout> | |
| <mmonitRegisterCredentials>1</mmonitRegisterCredentials> | |
| </general> | |
| <alert uuid="315e6e11-d101-47c9-8c96-b3ad9c5aba9f"> | |
| <enabled>0</enabled> | |
| <recipient>root@localhost.local</recipient> | |
| <noton>0</noton> | |
| <events/> | |
| <format/> | |
| <reminder>10</reminder> | |
| <description/> | |
| </alert> | |
| <service uuid="64fbcc2a-62e7-47cf-a342-8961b83197ee"> | |
| <enabled>1</enabled> | |
| <name>$HOST</name> | |
| <description/> | |
| <type>system</type> | |
| <pidfile/> | |
| <match/> | |
| <path/> | |
| <timeout>300</timeout> | |
| <address/> | |
| <interface/> | |
| <start/> | |
| <stop/> | |
| <tests>c77429f2-9c57-4f56-a018-890ccd966278,a9556376-a944-48fd-b753-12c6d956adf7,820091ca-133f-4b72-83fc-edf83f6594fb,739c734b-395a-4062-bbc3-e7e6518fbcc3</tests> | |
| <depends/> | |
| <polltime/> | |
| </service> | |
| <service uuid="243bed69-6fde-44fa-8e77-23ce3af3531a"> | |
| <enabled>1</enabled> | |
| <name>RootFs</name> | |
| <description/> | |
| <type>filesystem</type> | |
| <pidfile/> | |
| <match/> | |
| <path>/</path> | |
| <timeout>300</timeout> | |
| <address/> | |
| <interface/> | |
| <start/> | |
| <stop/> | |
| <tests>bf5140b8-7545-4188-b47b-fb29501650bd</tests> | |
| <depends/> | |
| <polltime/> | |
| </service> | |
| <service uuid="9de4dd16-dfd1-4b02-9706-a9e24a242a1f"> | |
| <enabled>0</enabled> | |
| <name>carp_status_change</name> | |
| <description/> | |
| <type>custom</type> | |
| <pidfile/> | |
| <match/> | |
| <path>/usr/local/opnsense/scripts/OPNsense/Monit/carp_status</path> | |
| <timeout>300</timeout> | |
| <address/> | |
| <interface/> | |
| <start/> | |
| <stop/> | |
| <tests>1c179742-6570-46bf-a343-8bedcf910b25</tests> | |
| <depends/> | |
| <polltime/> | |
| </service> | |
| <service uuid="c19defcf-d847-4d73-a3b0-d17201095f66"> | |
| <enabled>0</enabled> | |
| <name>gateway_alert</name> | |
| <description/> | |
| <type>custom</type> | |
| <pidfile/> | |
| <match/> | |
| <path>/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert</path> | |
| <timeout>300</timeout> | |
| <address/> | |
| <interface/> | |
| <start/> | |
| <stop/> | |
| <tests>a8b6b926-331a-4bc4-a221-a5fa957a3c43</tests> | |
| <depends/> | |
| <polltime/> | |
| </service> | |
| <test uuid="1ec402c5-57fa-45a5-af63-2b1798ba9b53"> | |
| <name>Ping</name> | |
| <type>NetworkPing</type> | |
| <condition>failed ping</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="969f9bb7-06d8-4c9a-9a33-f79418d8bd66"> | |
| <name>NetworkLink</name> | |
| <type>NetworkInterface</type> | |
| <condition>failed link</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="109abb3b-cde9-4a1a-99da-d0d89096136c"> | |
| <name>NetworkSaturation</name> | |
| <type>NetworkInterface</type> | |
| <condition>saturation is greater than 75%</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="c77429f2-9c57-4f56-a018-890ccd966278"> | |
| <name>MemoryUsage</name> | |
| <type>SystemResource</type> | |
| <condition>memory usage is greater than 75%</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="a9556376-a944-48fd-b753-12c6d956adf7"> | |
| <name>CPUUsage</name> | |
| <type>SystemResource</type> | |
| <condition>cpu usage is greater than 75%</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="820091ca-133f-4b72-83fc-edf83f6594fb"> | |
| <name>LoadAvg1</name> | |
| <type>SystemResource</type> | |
| <condition>loadavg (1min) is greater than 4</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="739c734b-395a-4062-bbc3-e7e6518fbcc3"> | |
| <name>LoadAvg5</name> | |
| <type>SystemResource</type> | |
| <condition>loadavg (5min) is greater than 3</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="3cc419ad-e5a1-4f22-8f73-8a1053fbc320"> | |
| <name>LoadAvg15</name> | |
| <type>SystemResource</type> | |
| <condition>loadavg (15min) is greater than 2</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="bf5140b8-7545-4188-b47b-fb29501650bd"> | |
| <name>SpaceUsage</name> | |
| <type>SpaceUsage</type> | |
| <condition>space usage is greater than 75%</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="1c179742-6570-46bf-a343-8bedcf910b25"> | |
| <name>ChangedStatus</name> | |
| <type>ProgramStatus</type> | |
| <condition>changed status</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| <test uuid="a8b6b926-331a-4bc4-a221-a5fa957a3c43"> | |
| <name>NonZeroStatus</name> | |
| <type>ProgramStatus</type> | |
| <condition>status != 0</condition> | |
| <action>alert</action> | |
| <path/> | |
| </test> | |
| </monit> | |
| <OpenVPNExport version="0.0.1"> | |
| <servers/> | |
| </OpenVPNExport> | |
| <proxy version="1.0.5"> | |
| <general> | |
| <enabled>0</enabled> | |
| <error_pages>opnsense</error_pages> | |
| <icpPort/> | |
| <logging> | |
| <enable> | |
| <accessLog>1</accessLog> | |
| <storeLog>1</storeLog> | |
| </enable> | |
| <ignoreLogACL/> | |
| <target/> | |
| </logging> | |
| <alternateDNSservers/> | |
| <dnsV4First>0</dnsV4First> | |
| <forwardedForHandling>on</forwardedForHandling> | |
| <uriWhitespaceHandling>strip</uriWhitespaceHandling> | |
| <enablePinger>1</enablePinger> | |
| <useViaHeader>1</useViaHeader> | |
| <suppressVersion>0</suppressVersion> | |
| <connecttimeout/> | |
| <VisibleEmail>admin@localhost.local</VisibleEmail> | |
| <VisibleHostname/> | |
| <cache> | |
| <local> | |
| <enabled>0</enabled> | |
| <directory>/var/squid/cache</directory> | |
| <cache_mem>256</cache_mem> | |
| <maximum_object_size/> | |
| <maximum_object_size_in_memory/> | |
| <memory_cache_mode>always</memory_cache_mode> | |
| <size>100</size> | |
| <l1>16</l1> | |
| <l2>256</l2> | |
| <cache_linux_packages>0</cache_linux_packages> | |
| <cache_windows_updates>0</cache_windows_updates> | |
| </local> | |
| </cache> | |
| <traffic> | |
| <enabled>0</enabled> | |
| <maxDownloadSize>2048</maxDownloadSize> | |
| <maxUploadSize>1024</maxUploadSize> | |
| <OverallBandwidthTrotteling>1024</OverallBandwidthTrotteling> | |
| <perHostTrotteling>256</perHostTrotteling> | |
| </traffic> | |
| <parentproxy> | |
| <enabled>0</enabled> | |
| <host/> | |
| <enableauth>0</enableauth> | |
| <user>username</user> | |
| <password>password</password> | |
| <port/> | |
| <localdomains/> | |
| <localips/> | |
| </parentproxy> | |
| </general> | |
| <forward> | |
| <interfaces>lan</interfaces> | |
| <port>3128</port> | |
| <sslbumpport>3129</sslbumpport> | |
| <sslbump>0</sslbump> | |
| <sslurlonly>0</sslurlonly> | |
| <sslcertificate/> | |
| <sslnobumpsites/> | |
| <ssl_crtd_storage_max_size>4</ssl_crtd_storage_max_size> | |
| <sslcrtd_children>5</sslcrtd_children> | |
| <snmp_enable>0</snmp_enable> | |
| <snmp_port>3401</snmp_port> | |
| <snmp_password>public</snmp_password> | |
| <ftpInterfaces/> | |
| <ftpPort>2121</ftpPort> | |
| <ftpTransparentMode>0</ftpTransparentMode> | |
| <addACLforInterfaceSubnets>1</addACLforInterfaceSubnets> | |
| <transparentMode>0</transparentMode> | |
| <acl> | |
| <allowedSubnets/> | |
| <unrestricted/> | |
| <bannedHosts/> | |
| <whiteList/> | |
| <blackList/> | |
| <browser/> | |
| <mimeType/> | |
| <googleapps/> | |
| <youtube/> | |
| <safePorts>80:http,21:ftp,443:https,70:gopher,210:wais,1025-65535:unregistered ports,280:http-mgmt,488:gss-http,591:filemaker,777:multiling http</safePorts> | |
| <sslPorts>443:https</sslPorts> | |
| <remoteACLs> | |
| <blacklists/> | |
| <UpdateCron/> | |
| </remoteACLs> | |
| </acl> | |
| <icap> | |
| <enable>0</enable> | |
| <RequestURL>icap://[::1]:1344/avscan</RequestURL> | |
| <ResponseURL>icap://[::1]:1344/avscan</ResponseURL> | |
| <SendClientIP>1</SendClientIP> | |
| <SendUsername>0</SendUsername> | |
| <EncodeUsername>0</EncodeUsername> | |
| <UsernameHeader>X-Username</UsernameHeader> | |
| <EnablePreview>1</EnablePreview> | |
| <PreviewSize>1024</PreviewSize> | |
| <OptionsTTL>60</OptionsTTL> | |
| <exclude/> | |
| </icap> | |
| <authentication> | |
| <method/> | |
| <authEnforceGroup/> | |
| <realm>OPNsense proxy authentication</realm> | |
| <credentialsttl>2</credentialsttl> | |
| <children>5</children> | |
| </authentication> | |
| </forward> | |
| <pac/> | |
| <error_pages> | |
| <template/> | |
| </error_pages> | |
| </proxy> | |
| <Syslog version="1.0.1"> | |
| <general> | |
| <enabled>1</enabled> | |
| </general> | |
| <destinations/> | |
| </Syslog> | |
| <TrafficShaper version="1.0.3"> | |
| <pipes/> | |
| <queues/> | |
| <rules/> | |
| </TrafficShaper> | |
| <unboundplus version="1.0.4"> | |
| <service_enabled/> | |
| <advanced> | |
| <hideidentity>0</hideidentity> | |
| <hideversion>0</hideversion> | |
| <prefetch>0</prefetch> | |
| <prefetchkey>0</prefetchkey> | |
| <dnssecstripped>0</dnssecstripped> | |
| <serveexpired>0</serveexpired> | |
| <serveexpiredreplyttl/> | |
| <serveexpiredttl/> | |
| <serveexpiredttlreset>0</serveexpiredttlreset> | |
| <serveexpiredclienttimeout/> | |
| <qnameminstrict>0</qnameminstrict> | |
| <extendedstatistics>0</extendedstatistics> | |
| <logqueries>0</logqueries> | |
| <logreplies>0</logreplies> | |
| <logtagqueryreply>0</logtagqueryreply> | |
| <logverbosity>1</logverbosity> | |
| <privatedomain/> | |
| <privateaddress>0.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/10</privateaddress> | |
| <insecuredomain/> | |
| <msgcachesize/> | |
| <rrsetcachesize/> | |
| <outgoingnumtcp/> | |
| <incomingnumtcp/> | |
| <numqueriesperthread/> | |
| <outgoingrange/> | |
| <jostletimeout/> | |
| <cachemaxttl/> | |
| <cacheminttl/> | |
| <infrahostttl/> | |
| <infracachenumhosts/> | |
| <unwantedreplythreshold/> | |
| </advanced> | |
| <dnsbl> | |
| <enabled>0</enabled> | |
| <type/> | |
| <lists/> | |
| <whitelists/> | |
| <blocklists/> | |
| <address/> | |
| <nxdomain>0</nxdomain> | |
| </dnsbl> | |
| <forwarding> | |
| <enabled>1</enabled> | |
| </forwarding> | |
| <dots> | |
| <dot uuid="eb35e964-56c8-4706-b6fb-f55fb7ce850a"> | |
| <enabled>0</enabled> | |
| <type>forward</type> | |
| <domain/> | |
| <server>1.1.1.1</server> | |
| <port>53</port> | |
| <verify/> | |
| </dot> | |
| </dots> | |
| <hosts/> | |
| <aliases/> | |
| <domains/> | |
| </unboundplus> | |
| <wireguard> | |
| <general version="0.0.1"> | |
| <enabled>1</enabled> | |
| </general> | |
| <client version="0.0.7"> | |
| <clients> | |
| <client uuid="ae418043-cc29-4f94-abd6-27a9803ffc6a"> | |
| <enabled>1</enabled> | |
| <name>VPS</name> | |
| <pubkey></pubkey> | |
| <psk/> | |
| <tunneladdress>0.0.0.0/0</tunneladdress> | |
| <serveraddress></serveraddress> | |
| <serverport>51820</serverport> | |
| <keepalive>25</keepalive> | |
| </client> | |
| </clients> | |
| </client> | |
| <server version="0.0.4"> | |
| <servers> | |
| <server uuid="756a7c9a-f18e-4c63-9454-ca93e72185a0"> | |
| <enabled>1</enabled> | |
| <name>WireGuard_VPN</name> | |
| <instance>1</instance> | |
| <pubkey></pubkey> | |
| <privkey></privkey> | |
| <port>51820</port> | |
| <mtu>1420</mtu> | |
| <dns/> | |
| <tunneladdress>10.8.0.2/24</tunneladdress> | |
| <disableroutes>1</disableroutes> | |
| <gateway>10.8.0.240</gateway> | |
| <peers>ae418043-cc29-4f94-abd6-27a9803ffc6a</peers> | |
| </server> | |
| </servers> | |
| </server> | |
| </wireguard> | |
| <Swanctl version="1.0.0"> | |
| <Connections/> | |
| <locals/> | |
| <remotes/> | |
| <children/> | |
| <Pools/> | |
| <VTIs/> | |
| <SPDs/> | |
| </Swanctl> | |
| </OPNsense> | |
| <vlans version="1.0.0"> | |
| <vlan/> | |
| </vlans> | |
| <staticroutes version="1.0.0"> | |
| <route/> | |
| </staticroutes> | |
| <bridges> | |
| <bridged/> | |
| </bridges> | |
| <gifs> | |
| <gif/> | |
| </gifs> | |
| <gres> | |
| <gre/> | |
| </gres> | |
| <ca/> | |
| <gateways> | |
| <gateway_item> | |
| <interface>opt5</interface> | |
| <gateway>10.8.0.240</gateway> | |
| <name>WireGuard</name> | |
| <priority>255</priority> | |
| <weight>1</weight> | |
| <ipprotocol>inet</ipprotocol> | |
| <interval/> | |
| <descr/> | |
| <monitor>10.8.0.1</monitor> | |
| <fargw>1</fargw> | |
| </gateway_item> | |
| </gateways> | |
| <virtualip version="1.0.0"/> | |
| <cert> | |
| <refid>638682ed1f3b2</refid> | |
| <descr>Web GUI TLS certificate</descr> | |
| <crt>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</crt> | |
| <prv>LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUpRZ0lCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQ1N3d2dna29BZ0VBQW9JQ0FRRFBDTUhWaVFIT2VSR1oKZ3REM0F5OW5DdWdXaWhYV0I2MXVvSWptSm5oT2trakU3Z0NDc0JLeG9Xa0VRV3FTYzg2ZnJVZjVpMDFhcUFMOApGR0d3ODBZK1lLU0ZMM3BuVXBxcWJVUWpyR1V2WE8ybUxFOGxQZWdUcFViZjI4SmNFTFJrQ21kZjF4a1N0VGpDCk9uelNERFZ6a2xiS2ZwOEJtYlRidHJLM25GMGY2SUp5VE5kR1J4L3JHM25Pemx1MEZJSGZCTGt5UFlVVmp6b2IKMFlPN2h0bjJydzkzYmNwbTNhNXZhMTRGcGJtd0NMMWhhUHZhSDBackxZRVZpckpnaklKWldKQTdrSWpwdk1CQgo3bjJRVDF5U2taWUtWSUFkQndPS1NmZjlwZmtLZnNPRjQ2T255My92alk4NldFZTh5MjdGenp1aGc1VDErQUlMCkhhdjhlR09yVUFlTlVZM2ZQWStsQUttZ1JYc3Y5VElYRkhYUWU2b0J5TnZxMFd4SVYxN2lZZzYzc2FUU3NIcHEKMGZkaSs2TlpLUWJHUnpFeFZ2RWpDU3NLbjYwNTZ5WVRhNS9WMXdWdXVab04rdlhhQU9iU2NJQXg1RU9XZGdrZgozbFcyQURkYWxCcEVKOWdqcG5LQnhwWHd1eWVRUlRJTFZTMTdLZzRFUklpU2JJTElEeFNPNjNkNk0yeC9YQVZECnNBSVZJM3ZYNmI1VHNTK2NrTmYwSldQT2YvWDRjWThBdVFvMXhQYjhxOFV0Vndlb0JIa2JvTVhtV05Zd2hxNUwKdnVsZnozQmNVdHdFQUlaVlNhY3N0ZDFqYmw5dW5MYWtVQi9kTFBsMU9Kc3N4UHJFSFo0UFJOWmFRZXhCbWpxdgo1WG94K3ZTRGlLcG5hQ0FPb0MyY3U0eTdta1FYUlFJREFRQUJBb0lDQUQrL0Q0ZkROcll2V3Zic2E1RVMvdjU0ClFqdm1hcERMTG1CNHQ0NDkzQjg5TllERlU0enB6K2UzcmxFc0h6ZFd4eEV0VnBNRWpGM1VpNDY0YTlnREgrYkcKOVFFNVBEUWlJQk5IcjRwWVk1Tnd4bys2NXVldHB3NmRmalFoUXpmN3dMOW80S21HM21aL1BDbTV2b01pVlRidgpvUithV3pVdjhac1JKdmdZQWloMysrcGJ0SkVrQnpUcDhkaDJlNC80SElEaHdIQXl0dzZMV2pZRWpjNG8yR1gzClF3amYya2xRQ295dC8zWTNyL1Arek9qNFhVdXRBNDZ1cFNkUDNGcVVDUEtmclZGWjBINC9xdWJpR3ZGYkxrTEcKNXU3cFU4VWNTci9DeE1QcDNjT1lnblZ3UVF6Q1FQTXVvQ0l6Mm1yTUxLQmxqWlBPb3dnVlEvUE9RQTF0dUNvUwpRWWlCclVZTFNrc0VNV3NpMk1ZanFsQXpJL2NJTHFJc1Z5VnIrUmxlcHI4NnBQbXhYaXhueWJhYkRLUFRxeDlHCnE1M3RSUjY3Tm4zcWprTWoraTRHL3ZXZjh3UWVacE9EQVFoTWQvWjJQNlNDRUU5RnhNV3BTUGtPRk9hbktQb1UKTERSbVlReHY5akx6ZExiNVpoaHZhWWFxMnphNVcweEtjaG9PYStqUDNqdWZQamErYXNQVDNhUVFLeW5rdzRhYwp1RWN5QnFSYVpabVF2dWlrZDA1enA4Vm5ZQTM5endFeVRrSW9Gd2Y2aU9zMFBzUmdGYUFyK3V1SnB2d2doSkxuCnhlOTgwS3lVdVBMNmdhWml4cVhNMHJaOVpZUVJlM3FEL2VJZmd5cHVvcVJmL1A2b3g1NlBKYml4Nmx5N3E2STYKMVN4UjNURkNKc0t1ZmpyMlI3ZkJBb0lCQVFEMzlJd2Z3aSthd21tVjR2ZXZ5bnFRM21zUHliOXpZamdFSno3UApqV0p1TG1CTnNMZFo2aFhoL05VaUJ4NUhmWE1tL2kvTmI0anpQd1djbER6Wk5Wb3E2NmtFbWdaZ0JMeWxVS2pPCkdlaVVXWG1WT05MekczUU94dEpPTC9TdkZxOWxpVFZOUnhERW85cVFHYXdTOGF0emRVOVpPTDV3Z3dndXkrNUIKWk42b04zYkdtS3RyaWZDRk5ReVpzZm9RaE5IREJ5VlhrTzZnbFR5MGNENEFqSHlCZDFuWXkrSFAwQmxBd0F1QwpNY3FBN0QyMDdOTTJ6UDBxVnFmZ1A2YSszdUI4clpxR3JlTEhkd1NzcGcwNjFiYXNJZlB3a3NoS3N3WWdGSWNMCm1kMFB4R3V3aFpVa3dmMlgxRFBjN2p5bzJka09veWp5cE9haWdnK3RRRHdjN0FDUkFvSUJBUURWd0ZSOXVoU3cKYVBSWFpmVkwzbkdEaDUvc0crdTdkOXBHRjBMcFE5cEJWV0JoSGg3cHBwZ2txd3hJZy9QMmt6Rm4rN2RWd0hDYQpWV0FVQmMwdERBQkRtTHRIblpjZWQ4SlYvdUpCNEpaUjVZVmp4bEhwZXh4dFpDVm81V210bDFqeVJ1aytaQWJICmI4d3l2MFhJNDlQR1lpT3FiekUwWDNaQ1BHbXozVld1L0U4NCt2OUpLb3p0bXQ2Wi90WGxVRkc0cVhTVUZNS2EKc09sZTU3K1pCdEtXT3p5VEErTzFwLytUK3BWMnljL3g0cnRzdXVMQzZiSm9heTd4c3Q5bGxZTTl1dXlFZk1VYQo0MlQ1MkVxSmZQL1hNNDYyOWZFaUszenJCdnRxaDA0ZkU5R21DS2JsekVFMWFMVG1FRzlKczNtOStNckx4OUdrCmUrMmIrRGRTbFFWMUFvSUJBQkFyb0ovSm1EVXRqSms3emc5bTB3dHpsZVBYc21haDl5aytMZmgzTGY0bGhCNU0KOGdncEhmZzQ5dVZiTlh4UUVCeHc0MGt3aHV2bUprV0ozVllGQnJaWjNCSHl3WXV0ZzJmOGxLV3NSdUMxM1JvQQpOTEdxRHEyUUJkTVhpWXVKblRLditndnFJSXZTYThTT0NBek1PZlF6cUZNWFFrUXdKMjUxMmpubGpDZklSalM1CmJDUjlRSFJQZTF6aW9INUhTeTYrM282Ull4NlIzUDJmZkV1bzNjM0xyTTVZcllkUitQT2lFcDRSQlRYWE1rY0UKVXRuMkVHU2NkaUpIeEdZYVB1V2lwTHMzeDl4ZVJLM0Z2b01od09JRTdOVzVuTnBTUm9uOURMbVM5VG04QTVIbApoRTU3WUVCd2xGbEtLQ2FTM25iMzZRbTUrMWlKeHQvem1uZ0FaQ0VDZ2dFQkFKMnNKT2NsVjFPVjUvOThSMGh5Cnlyc2lWVFplbGpJUVErT0dEeVp3bGRPeHZjbUY1WG1uR1AyYmF4RW12TlE3V2F1Qmc0aHV6dUVaYnlqMTZwWjcKRHNyT0kvKzg0SmRwOGVGcmhjemdkU0h1TThvWXBaMmI0YWxUd1VDeVVaVHFXb05GQ1pLclNGRGZSL3A3RzJnSApudFRzMmJCRUcwQ3QxbGNmcHowMVhKb2FwZm03TklydEowMngrdGdQb2dwb2lBKzJlRGN2WlNta3JGRUVsRkcyCk5hcjZBVUhWRWFpVFJ6VUtHQ3lxeTRoN0hwUWkrMWlaK0srTHVQSXpaeFRSQ0NHRi9DZnl2WmFLL0paTUZSZDgKTEdDN09GLy81YUsxLzR5Qzl2eHEySmFXRVFUdnh1VW1HVWZqZCtWcFpCNHlsUEFzVUxPbkx4NnRCK1lRWUFhNwp4RzBDZ2dFQVB3V29MUDZ3ZDZDMGJHK0FQK3E2MGovbE96c1pNblpLTmNyQjdCWHNzL0hvRkJHYVZoNm5yWTkvClhHSklmSTlPeDNMN2g4MENCL3c2TzJ0UDJlNGhNSlFLbzNDUVZYZitNUnJmWkIwOTNUVGtmd2Y4U1pIYnh4YVoKVlpacytEYTExQmFjZEhxRU9najBVSnRFWVdnT1JnNW1CNTFINVNSSHNTUk03NllPczVwOVFzbFdMRGNaYTY4NAoxNlRXbzJvZnRtcmZKN0F3ME9YSFlYR3dhcXcwdE5oSkdMZmg4eTFKa3BXdDBqRm5JSzVnejRYTmpnQU53K0IzCmVEaVhkQWlVU1VEMEdTVG8zdTQyWkVHVnRuang2dEh4eElsL1Q2SGFOQXhuRGd0VjA0eGRNWEc2UTUwenVURU4KNkYzQXRrekdhWmVGNzEwT0IxU2tuYWYyakpBRGFRPT0KLS0tLS1FTkQgUFJJVkFURSBLRVktLS0tLQo=</prv> | |
| </cert> | |
| <ppps> | |
| <ppp/> | |
| </ppps> | |
| <laggs> | |
| <lagg/> | |
| </laggs> | |
| <wireless> | |
| <clone/> | |
| </wireless> | |
| </opnsense> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment